Enabling Continuously Evolving Context Information in Mobile Environments by Utilizing Ubiquitous Sensors

Author(s):  
Stefan Forsström ◽  
Theo Kanter
Author(s):  
Volkmar Lotz ◽  
Luca Compagna ◽  
Konrad Wrona

The flexibility and dynamism of ubiquitous computing systems have a strong impact on the way their security can be achieved, reaching beyond traditional security paradigms like perimeter security and communication channel protection. Constant change of both the system and its environment demand adaptive security architectures, capable of reacting to events, evaluating threat exposure, and taking evolving protection needs into account. We introduce two examples of projects that contribute to meeting the challenges on adaptive security. The first focuses on an architecture that allows for adaptive security in mobile environments based on security services whose adaptation is guided by context information derived from sensor networks. The second addresses engineering aspects of secure ubiquitous computing systems through making security solutions accessible and deployable on demand and following emerging application-level requirements.


2009 ◽  
pp. 2424-2434
Author(s):  
Volkmar Lotz ◽  
Luca Compagna ◽  
Konrad Wrona

The flexibility and dynamism of ubiquitous computing systems have a strong impact on the way their security can be achieved, reaching beyond traditional security paradigms like perimeter security and communication channel protection. Constant change of both the system and its environment demand adaptive security architectures, capable of reacting to events, evaluating threat exposure, and taking evolving protection needs into account. We introduce two examples of projects that contribute to meeting the challenges on adaptive security. The first focuses on an architecture that allows for adaptive security in mobile environments based on security services whose adaptation is guided by context information derived from sensor networks. The second addresses engineering aspects of secure ubiquitous computing systems through making security solutions accessible and deployable on demand and following emerging application-level requirements.


2010 ◽  
Vol 41 (3) ◽  
pp. 131-136 ◽  
Author(s):  
Catharina Casper ◽  
Klaus Rothermund ◽  
Dirk Wentura

Processes involving an automatic activation of stereotypes in different contexts were investigated using a priming paradigm with the lexical decision task. The names of social categories were combined with background pictures of specific situations to yield a compound prime comprising category and context information. Significant category priming effects for stereotypic attributes (e.g., Bavarians – beer) emerged for fitting contexts (e.g., in combination with a picture of a marquee) but not for nonfitting contexts (e.g., in combination with a picture of a shop). Findings indicate that social stereotypes are organized as specific mental schemas that are triggered by a combination of category and context information.


Author(s):  
Veronika Lerche ◽  
Ursula Christmann ◽  
Andreas Voss

Abstract. In experiments by Gibbs, Kushner, and Mills (1991) , sentences were supposedly either authored by poets or by a computer. Gibbs et al. (1991) concluded from their results that the assumed source of the text influences speed of processing, with a higher speed for metaphorical sentences in the Poet condition. However, the dependent variables used (e.g., mean RTs) do not allow clear conclusions regarding processing speed. It is also possible that participants had prior biases before the presentation of the stimuli. We conducted a conceptual replication and applied the diffusion model ( Ratcliff, 1978 ) to disentangle a possible effect on processing speed from a prior bias. Our results are in accordance with the interpretation by Gibbs et al. (1991) : The context information affected processing speed, not a priori decision settings. Additionally, analyses of model fit revealed that the diffusion model provided a good account of the data of this complex verbal task.


Author(s):  
Yanlei Gu ◽  
Dailin Li ◽  
Yoshihiko Kamiya ◽  
Shunsuke Kamijo

Sign in / Sign up

Export Citation Format

Share Document